US7649842B2 - Method of selective dormant data session reactivation - Google Patents

Method of selective dormant data session reactivation Download PDF

Info

Publication number
US7649842B2
US7649842B2 US11/240,180 US24018005A US7649842B2 US 7649842 B2 US7649842 B2 US 7649842B2 US 24018005 A US24018005 A US 24018005A US 7649842 B2 US7649842 B2 US 7649842B2
Authority
US
United States
Prior art keywords
packets
time interval
source
rate threshold
mobile station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US11/240,180
Other versions
US20070070889A1 (en
Inventor
Jose A. Laboy
Joel L. Gross
Brian A. Hansche
Karl E. Miller
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google Technology Holdings LLC
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc filed Critical Motorola Inc
Assigned to MOTOROLA, INC. reassignment MOTOROLA, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GROSS, JOEL L., HANSCHE, BRIAN A., LABOY, JOSE A., MILLER, KARL E.
Priority to US11/240,180 priority Critical patent/US7649842B2/en
Priority to KR1020087010180A priority patent/KR100966440B1/en
Priority to CN2006800359111A priority patent/CN101288265B/en
Priority to PCT/US2006/024621 priority patent/WO2007040687A1/en
Publication of US20070070889A1 publication Critical patent/US20070070889A1/en
Publication of US7649842B2 publication Critical patent/US7649842B2/en
Application granted granted Critical
Assigned to Motorola Mobility, Inc reassignment Motorola Mobility, Inc ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOTOROLA, INC
Assigned to MOTOROLA MOBILITY LLC reassignment MOTOROLA MOBILITY LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: MOTOROLA MOBILITY, INC.
Assigned to Google Technology Holdings LLC reassignment Google Technology Holdings LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOTOROLA MOBILITY LLC
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/08Upper layer protocols
    • H04W80/10Upper layer protocols adapted for application session management, e.g. SIP [Session Initiation Protocol]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • H04W28/14Flow control between communication endpoints using intermediate storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • H04W28/22Negotiating communication rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Definitions

  • a mobile station may be in a dormant state, where the cellular network is aware of the mobile station on the system, but currently, there is no activity with the mobile station.
  • the mobile station is registered with the cellular network, but is in a dormant data session as no active communication sessions are taking place.
  • An example of this is a mobile station that is registered and has been active in the cellular network, but is currently inactive without having powered off, such as a mobile station in a push-to-talk session, a mobile station awaiting a paging request, and the like.
  • IP Internet Protocol
  • IP scans can overload the cellular network system.
  • IP scans may or may not be intentionally implemented to search for mobile stations in a dormant data session in order to reactivate them.
  • IP scans of mobile stations in a dormant state does load a cellular network with mobile page attempts.
  • the prior art is deficient in distinguishing these malicious users of the cellular network system from legitimate users.
  • a method of selective dormant data session reactivation in a radio access network includes calculating an activation rate threshold as a function of a first plurality of packets received by a packet control function operating in a radio access network over a first time interval.
  • the first plurality of packets is coupled to reactivate at least one dormant mobile station operating in a wireless communication system.
  • the method also includes buffering a second plurality of packets received in a second time interval, wherein each of the second plurality of packets has a destination IP address coupled to reactivate the dormant mobile station.
  • the method compares an arrival rate of the second plurality of packets in the second time interval to the activation rate threshold.
  • the second plurality of packets are separated into a plurality of source IP groups according to their respective source IP addresses and one of the plurality of source IP groups having a highest number of the second plurality of packets is discarded.
  • the method includes iteratively comparing the arrival rate of the second plurality of packets in the second time interval without the one of the plurality of source IP groups, to the activation rate threshold and if the arrival rate of the second plurality of packets in the second time interval without the one of the plurality of source IP groups exceeds the activation rate threshold, discarding the one of the plurality of source IP groups having a next highest number of the second plurality of packets.
  • FIG. 1 representatively illustrates a block diagram of a wireless communication system in accordance with an exemplary embodiment of the present invention
  • FIG. 2 representatively illustrates a more detailed block diagram of a wireless communication system in accordance with an exemplary embodiment of the present invention.
  • FIG. 3 representatively illustrates flow diagram in accordance with an exemplary embodiment of the present invention.
  • Software blocks that perform embodiments of the present invention can be part of computer program modules comprising computer instructions, such control algorithms that are stored in a computer-readable medium such as memory.
  • Computer instructions can instruct processors to perform any methods described below. In other embodiments, additional modules could be provided as needed.
  • Wireless communication systems are well known and consist of many types including land mobile radio, cellular radiotelephone (inclusive of analog cellular, digital cellular, personal communication systems (PCS) and wideband digital cellular systems), and other communication system types.
  • cellular radiotelephone communication systems for example, a number of communication cells are typically comprised of one or more Base Transceiver Stations (BTS's) coupled to one or more Base Station Controllers (BSCs) or Central Base Station Controllers (CBSCs) and forming a Radio Access Network (RAN).
  • BTS's Base Transceiver Stations
  • BSCs Base Station Controllers
  • CBSCs Central Base Station Controllers
  • RAN Radio Access Network
  • the BSCs or CBSCs are, in turn, coupled to a Mobile Switching Center (MSC) that provides a connection between the RAN and an external network, such as a Public Switched Telephone Network (PSTN), as well as interconnection to other RANs.
  • MSC Mobile Switching Center
  • PSTN Public Switched Telephone Network
  • Each BTS provides communication services to a mobile station (MS) located in a coverage area serviced by the BTS via a communication resource that includes a forward link for transmitting signals to, and a reverse link for receiving signals from, the MS.
  • FIG. 1 representatively illustrates a block diagram of a wireless communication system 100 in accordance with an exemplary embodiment of the present invention.
  • Wireless communication system 100 includes a RAN 104 comprising multiple BTSs 106 - 108 that are each coupled to a CBSC 110 .
  • RAN 104 is coupled to an MSC 114 , and MSC 114 is in turn coupled to an external network 116 and provides a communication link between the external network, or other RANs, and RAN 104 .
  • RAN 104 is a CDMA network.
  • Wireless communication system 100 further includes a mobile station 102 , 103 , 105 that may be in a dormant data session with a BTS 106 , 107 , 108 . That is, mobile station 102 if it is in a dormant data session, for example, is not in an active communication session with BTS 106 , but is powered-up, registered and may have been recently in an active communication session with BTS 106 . While RAN 104 is aware of mobile station 102 , no active communication is currently occurring between mobile station 102 and RAN 104 . In a dormant data session, mobile station 102 is a dormant mobile station, which is registered with RAN 104 and coupled to send or receive data via wireless link 120 .
  • Each communication link 120 , 130 , 140 includes a respective forward link for conveyance of signals to mobile station 102 and a respective reverse link for receipt of signals from the mobile station 102 .
  • Either mobile station 102 receiving a data packet via RAN 104 , or a user of mobile station 102 sending a data packet may reactivate dormant data session. Any number of mobile stations 102 , 103 , 105 may be coupled to RAN 104 and be in a dormant data session.
  • CBSC 110 may also include Packet Control Function (PCF) 118 .
  • PCF 118 is coupled to communicate packet data, particularly IP packet data, between the mobile station 102 , and the Packet Data Serving Node (PDSN) 139 over an interface, the A 10 /A 11 interface in the case of a CDMA network.
  • Packet control function 118 may operate to maintain a reachable state between RAN 104 and mobile station 102 , ensuring a consistent link for data packets, buffering of data packets arriving from PDSN 139 when wireless link resources are not in place or are insufficient to support the flow from PDSN 139 , and relay data packets between the mobile station 102 and PDSN 139 .
  • PCF 118 is not limited to a PCF in a CDMA network and may include one or more nodes in other radio access networks such as GSM, TDMA, and the like, that perform a substantially similar function.
  • PDSN 139 may be coupled to operate as the gateway from the RAN 104 into a public and/or private packet network, for example and without limitation, the Internet 113 .
  • PDSN 139 may act as a network access server, home agent, foreign agent, and the like.
  • PDSN 139 may manage the radio-packet interface between RAN 104 and Internet 113 , provide IP addresses for the subscriber's mobile station 102 , 103 , 105 , perform packet routing, actively manage subscriber services based on profile information, authenticate users, and the like.
  • PCF 118 may be coupled to receive incoming data packets addressed to a dormant mobile station 102 .
  • PCF 118 may be coupled to receive incoming data packets addressed to reactivate a dormant data session with mobile station 102 .
  • Such incoming data packets may originate from a packet data network external to RAN 104 , such as users connected to the Internet 113 , and the like.
  • incoming data packets may be incoming data coupled with a push-to-talk session, paging request, and the like.
  • mobile station 102 may be registered with RAN 104 but have no currently active data sessions in progress, i.e. mobile station 102 is in a dormant data session.
  • the arrival of a data packet for example as part of a paging request, may operate to reactivate dormant data session by reactivating dormant mobile station 102 .
  • PCF 118 is coupled to examine incoming data packets and determine if reactivation of a dormant data session with a dormant mobile station is permitted.
  • PCF may scan incoming data packets, including source IP addresses and destination IP addresses to determine if an incoming data packet is the product of a malicious IP scan or from a legitimate user.
  • a plurality of packets 160 may be received by PCF 118 via PDSN 139 .
  • plurality of packets 160 may include any number of data packets, for example and without limitation IP packets.
  • Each of plurality of packets 160 may have a source IP address 142 and a destination IP address 141 .
  • the source IP address 142 is an indication of the origination of the data packet, while the destination IP address 141 may be coupled to reactivate one or more dormant mobile stations 102 , 103 , 105 .
  • one or more of plurality of packets 160 may be addressed to reactivate a dormant data session with one or more of dormant mobile stations 102 , 103 , 105 .
  • This can be, for example, a paging request, and the like.
  • FIG. 2 representatively illustrates a more detailed block diagram of a wireless communication system 200 in accordance with an exemplary embodiment of the present invention. Only one BTS 107 and one mobile station 103 are shown for clarity. However, other BTS's and mobile stations may be included and be within the scope of the invention.
  • the plurality of packets 160 arriving at the RAN may be processed by the PCF 118 .
  • plurality of packets 160 may include any number of data packets, for example, IP packets.
  • the PCF 118 creates a sliding window average over a time interval of plurality of packets arriving that request the reactivation of a dormant data session of a dormant mobile station 103 . Based on this average, a dynamic threshold may be created such that any single time interval in which the arrival rate of packets requesting reactivation exceed the dynamic threshold, the PCF may discard a number of packets from one or more source IP addresses such that the arrival rate falls below the dynamic threshold.
  • incoming packets may be buffered such that PCF 118 examines incoming plurality of packets over a previous time interval to determine what packets to discard during the current time interval.
  • the reactivation rate of dormant mobile stations (number of reactivations per unit time) remains fairly constant when averaged over a short period of time.
  • a surge in reactivation rates may be detected when the variance in reactivation rate relative to a short term average exceeds a predefined limit.
  • the source address of those data packets associated with reactivation requests may be analyzed to determine the total number of reactivation requests per unit time associated with each source IP address.
  • the arrival rate of packets requesting reactivation can be compared with a multiple of the short term average of reactivation requests from a previous time interval. For example and without limitation, if the reactivation rate over a five second time interval is ten reactivations per second, then a surge in reactivation requests may be defined as a multiple of this number, say five to six times, or fifty to sixty reactivations in a one second time interval.
  • PCF 118 may examine packets requesting reactivation and identify the source address(es) most responsible for the surge condition and discard those packets such that they are never processed and do not reactivate a dormant mobile station. For example, packets may be sorted into groups from high number of packets to low number of packets based on their source IP address. The group of packets from a single source IP address with the highest number of packets may be discarded and the algorithm re-run if necessary to discard the group of packets with the next highest number of packets based on source IP address. This may continue until enough packets are discarded to alleviate the surge condition. The packets that are not discarded may be processed as normal and reactivate a dormant mobile station.
  • PCF 118 may receive a first plurality of packets 150 over a first time interval 151 .
  • First time interval 151 may be selected to suit a given application. For example and without limitation, first time interval 151 may be approximately five seconds.
  • First plurality of packets 150 may be data packets that are coupled to request a reactivation of a dormant mobile station 103 . Based on the number of first plurality of packets 150 requesting reactivation received in first time interval 151 , an average number of reactivation requests received in a given time interval, for example one second, may be calculated. From this, activation rate threshold 149 may be calculated.
  • activation rate threshold 149 may be a multiple of the average of the arrival rate of first plurality of packets (first plurality of packets 150 received over first time interval 151 ). In other words, activation rate threshold 149 may be a multiple of the average number of reactivation requests received in a given time interval. The multiple number (multiplier) may be chosen such that activation rate threshold 149 represents the point at which a surge condition is imminent. In other words, the average arrival rate may be calculated over first time interval 151 and this average arrival rate in a given time period may be multiplied by a multiplier to yield activation rate threshold 149 .
  • activation rate threshold may be a multiple of the ten reactivation requests per second as described above.
  • PCF 118 may buffer and store a second plurality of packets 152 received in a second time interval 153 where each of second plurality of packets 152 has a destination IP address 141 coupled to reactivate at least one dormant mobile station 103 .
  • Second time interval 153 may be selected to suit a given application. For example and without limitation, second time interval 153 may be approximately one second. In an embodiment, second time interval 153 follows first time interval 151 as shown in FIG. 2 . Also, first time interval 151 may be longer than second time interval 153 so as to maintain an adequate sample of reactivation requests for calculating activation rate threshold 149 . In another embodiment not shown in FIG. 2 , second time interval 153 may be a portion of first time interval 151 .
  • an arrival rate 143 of second plurality of packets 152 may be calculated. This may be the number of second plurality of packets 152 arriving in second time interval 153 .
  • the arrival rate 143 of the second plurality of packets 152 may then be compared to the activation rate threshold 149 calculated above. If the arrival rate 143 exceeds the activation rate threshold 149 , then the second plurality of packets 152 may be separated into a plurality of source IP groups 145 according to their respective source IP addresses. For example, the portion of second plurality of packets 152 having the most number of packets from one source IP address may be grouped into a source IP group having the highest number 170 of second plurality of packets.
  • the portion of second plurality of packets 152 having next highest number of packets from another source IP address may be grouped into a source IP group having a next highest number 171 of second plurality of packets, and so on for next highest numbers 172 , 173 .
  • Any number of groups of second plurality of packets may be created for plurality of source IP groups 145 . Further, any number of a portion of second plurality of packets may be included in each of source IP groups 145 .
  • the arrival rate 143 of second plurality of packets 152 is less than the activation rate threshold 149 , then the second plurality of packets 152 may proceed to be processed by PCF and reactivate one or more dormant mobile stations 103 .
  • a selective reactivation algorithm 147 may progressively discard in descending order, one of the plurality of source IP groups 145 having a highest number of second plurality of packets until the arrival rate 143 is below the activation rate threshold 149 .
  • progressively discarding in descending order may include discarding one or more source IP groups having the highest number 170 of second plurality of packets 152 all at once.
  • selective reactivation algorithm 147 may evaluate which of the plurality of source IP groups 145 should be discarded to bring the arrival rate 143 below the activation rate threshold 149 and then discard the one or more plurality of source IP groups all at once.
  • progressively discarding in descending order may include discarding the source IP group having the highest number 170 of second plurality of packets 152 and then comparing the arrival rate 143 of the second plurality of packets 152 in the second time interval 153 without the discarded source IP group, to the activation rate threshold 149 . If the arrival rate of the second plurality of packets 152 in the second time interval 153 without the discarded source IP group still exceeds the activation rate threshold 149 , the source IP group having the next highest number 171 of second plurality of packets 152 may be discarded. Comparing and discarding source IP groups in descending order based on number of second plurality of packets 152 in the source IP group may iteratively continue until the arrival rate 143 falls below the activation rate threshold 149 .
  • any of second plurality of packets 152 not discarded may be processed and allowed to reactivate one or more dormant mobile stations 103 .
  • discarding any of the second plurality of packets 152 in one or more of the source IP groups 145 has the effect of preventing the discarded packets from being processed and reactivating a dormant mobile station 103 .
  • a protected sender may be defined such that any packets from the protected sender may be allowed to pass through and be processed by the PCF 118 to allow reactivation of a dormant mobile station 103 .
  • a packet from a source IP address of a protected sender may be prevented from being separated into one of the plurality of source IP groups 145 and subsequently discarded. This allows packets from one or more protected senders to not be classified as malicious packets and activate one or more dormant mobile stations 103 .
  • first time interval 151 which is used to calculate activation rate threshold 149 is a sliding window average over a time interval of plurality of packets arriving that request the reactivation of a dormant data session of a dormant mobile station 103 .
  • first time interval is not fixed, but continues to update with the most current data. This allows for updating the average number of reactivation requests received over first time interval 151 .
  • activation rate threshold 149 to be dynamic and change with time.
  • a dynamic activation rate threshold 149 prevents the erroneous discarding of reactivation requests that may otherwise be legitimate as the average number of reactivation requests can change over time.
  • FIG. 3 representatively illustrates flow diagram 300 in accordance with an exemplary embodiment of the present invention.
  • the flow is invoked for each time step.
  • the PCF calculates the activation rate threshold as a function of first plurality of packets received over a first time interval, where the first plurality of packets are coupled to reactivate at least one dormant mobile station.
  • step 304 a second plurality of packets received over a second time interval are buffered, where each of the second plurality of packets has a destination IP address coupled to reactivate at least one dormant mobile station.
  • step 306 the arrival rate of the second plurality of packets in the second time interval is compared to the activation rate threshold.
  • step 308 it is determined if the arrival rate exceeds the activation rate threshold. If the arrival rate in step 308 does not exceed the activation rate threshold, then in step 309 all of the second plurality of packets may be processed without discard and allowed to reactivate one or more mobile devices in a dormant state. The process then adjusts to the next time step in step 320 .
  • step 310 the second plurality of packets are separated into a plurality of source IP groups based on their respective source IP address. The process then begins progressively discarding in descending order one of the plurality of source IP groups having a highest number of second plurality of packets until the arrival rate is below the activation rate threshold.
  • step 312 the source IP group having the highest number of second plurality of packets is discarded.
  • step 314 it is determined if the arrival rate of the second plurality of packets in the second time interval without the discarded IP source group (highest, next highest, and the like) is above the activation rate threshold. If not, then the second plurality of packets that are not discarded are processed and allowed to reactivate one or more dormant mobile stations per step 318 .
  • Step 314 the source IP group having the next highest number of second plurality of packets is discarded per step 316 .
  • Steps 314 and 316 may iteratively repeat themselves, discarding the source IP group having the next highest number of second plurality of packets, until the arrival rate without the discarded packets falls below the activation rate threshold and the process proceeds to step 318 .
  • step 318 the second plurality of packets that are not discarded are processed and allowed to reactivate one or more mobile stations in a dormant state. The process then ends for this invocation and enters the next time interval where the process may be repeated.
  • Selective reactivation algorithm may evaluate which of the plurality of source IP groups should be discarded to bring the arrival rate below the activation rate threshold and then discard the one or more plurality of source IP groups all at once.
  • any method or process claims may be executed in any order and are not limited to the specific order presented in the claims.
  • the components and/or elements recited in any apparatus claims may be assembled or otherwise operationally configured in a variety of permutations to produce substantially the same result as the present invention and are accordingly not limited to the specific configuration recited in the claims.
  • the terms “comprise”, “comprises”, “comprising”, “having”, “including”, “includes” or any variation thereof are intended to reference a non-exclusive inclusion, such that a process, method, article, composition or apparatus that comprises a list of elements does not include only those elements recited, but may also include other elements not expressly listed or inherent to such process, method, article, composition or apparatus.
  • Other combinations and/or modifications of the above-described structures, arrangements, applications, proportions, elements, materials or components used in the practice of the present invention, in addition to those not specifically recited, may be varied or otherwise particularly adapted to specific environments, manufacturing specifications, design parameters or other operating requirements without departing from the general principles of the same.

Abstract

A method of selective dormant data session reactivation in a radio access network includes calculating an activation rate threshold as a function of a first plurality of packets received over a first time interval, where the first plurality of packets are coupled to reactivate at least one dormant mobile station. The second plurality of packets received in a second time interval are buffered, where each of the second plurality of packets has a destination IP address to reactivate the at least one dormant mobile station. An arrival rate of the second plurality of packets in the second time interval is compared to the activation rate threshold. If the arrival rate exceeds the activation rate threshold, the second plurality of packets may be separated into a plurality of source IP groups according to their respective source IP addresses, and progressively discarding in descending order one of the plurality of source IP groups having a highest number of the second plurality of packets until the arrival rate is below the activation rate threshold.

Description

BACKGROUND OF INVENTION
In cellular network systems, particularly CDMA cellular networks, a mobile station may be in a dormant state, where the cellular network is aware of the mobile station on the system, but currently, there is no activity with the mobile station. In other words, the mobile station is registered with the cellular network, but is in a dormant data session as no active communication sessions are taking place. An example of this is a mobile station that is registered and has been active in the cellular network, but is currently inactive without having powered off, such as a mobile station in a push-to-talk session, a mobile station awaiting a paging request, and the like.
In prior art CDMA cellular networks, Internet users may cause abnormally high paging rates by implementing malicious Internet Protocol (IP) scans of IP addresses terminated on such dormant mobile stations. Such IP scans can overload the cellular network system. These malicious IP scans may or may not be intentionally implemented to search for mobile stations in a dormant data session in order to reactivate them. However, whether intentional or not, IP scans of mobile stations in a dormant state does load a cellular network with mobile page attempts. The prior art is deficient in distinguishing these malicious users of the cellular network system from legitimate users.
There is a need, not met in the prior art, for a method of selective dormant data session reactivation. Accordingly, there is a significant need for an apparatus and method that overcomes the deficiencies of the prior art outlined above.
SUMMARY OF THE INVENTION
To overcome the deficiencies described above, a method of selective dormant data session reactivation in a radio access network is disclosed. The method includes calculating an activation rate threshold as a function of a first plurality of packets received by a packet control function operating in a radio access network over a first time interval. The first plurality of packets is coupled to reactivate at least one dormant mobile station operating in a wireless communication system. The method also includes buffering a second plurality of packets received in a second time interval, wherein each of the second plurality of packets has a destination IP address coupled to reactivate the dormant mobile station. The method compares an arrival rate of the second plurality of packets in the second time interval to the activation rate threshold. If the arrival rate exceeds the activation rate threshold, the second plurality of packets are separated into a plurality of source IP groups according to their respective source IP addresses and one of the plurality of source IP groups having a highest number of the second plurality of packets is discarded. Until the arrival rate is below the activation threshold, the method includes iteratively comparing the arrival rate of the second plurality of packets in the second time interval without the one of the plurality of source IP groups, to the activation rate threshold and if the arrival rate of the second plurality of packets in the second time interval without the one of the plurality of source IP groups exceeds the activation rate threshold, discarding the one of the plurality of source IP groups having a next highest number of the second plurality of packets.
BRIEF DESCRIPTION OF THE DRAWINGS
Representative elements, operational features, applications and/or advantages of the present invention reside inter alia in the details of construction and operation as more fully hereafter depicted, described and claimed—reference being made to the accompanying drawings forming a part hereof, wherein like numerals refer to like parts throughout. Other elements, operational features, applications and/or advantages will become apparent in light of certain exemplary embodiments recited in the Detailed Description, wherein:
FIG. 1 representatively illustrates a block diagram of a wireless communication system in accordance with an exemplary embodiment of the present invention;
FIG. 2 representatively illustrates a more detailed block diagram of a wireless communication system in accordance with an exemplary embodiment of the present invention; and
FIG. 3 representatively illustrates flow diagram in accordance with an exemplary embodiment of the present invention.
Elements in the Figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the Figures may be exaggerated relative to other elements to help improve understanding of various embodiments of the present invention. Furthermore, the terms “first”, “second”, and the like herein, if any, are used inter alia for distinguishing between similar elements and not necessarily for describing a sequential or chronological order. Moreover, the terms “front”, “back”, “top”, “bottom”, “over”, “under”, and the like in the Description and/or in the Claims, if any, are generally employed for descriptive purposes and not necessarily for comprehensively describing exclusive relative position. Any of the preceding terms so used may be interchanged under appropriate circumstances such that various embodiments of the invention described herein may be capable of operation in other configurations and/or orientations than those explicitly illustrated or otherwise described.
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS
The following representative descriptions of the present invention generally relate to exemplary embodiments and the inventor's conception of the best mode, and are not intended to limit the applicability or configuration of the invention in any way. Rather, the following description is intended to provide convenient illustrations for implementing various embodiments of the invention. As will become apparent, changes may be made in the function and/or arrangement of any of the elements described in the disclosed exemplary embodiments without departing from the spirit and scope of the invention.
Software blocks that perform embodiments of the present invention can be part of computer program modules comprising computer instructions, such control algorithms that are stored in a computer-readable medium such as memory. Computer instructions can instruct processors to perform any methods described below. In other embodiments, additional modules could be provided as needed.
A detailed description of an exemplary application, namely a method of selective dormant data session reactivation, is provided as a specific enabling disclosure that may be generalized to any application of the disclosed system, device and method in accordance with various embodiments of the present invention.
Wireless communication systems are well known and consist of many types including land mobile radio, cellular radiotelephone (inclusive of analog cellular, digital cellular, personal communication systems (PCS) and wideband digital cellular systems), and other communication system types. In cellular radiotelephone communication systems, for example, a number of communication cells are typically comprised of one or more Base Transceiver Stations (BTS's) coupled to one or more Base Station Controllers (BSCs) or Central Base Station Controllers (CBSCs) and forming a Radio Access Network (RAN). The BSCs or CBSCs are, in turn, coupled to a Mobile Switching Center (MSC) that provides a connection between the RAN and an external network, such as a Public Switched Telephone Network (PSTN), as well as interconnection to other RANs. Each BTS provides communication services to a mobile station (MS) located in a coverage area serviced by the BTS via a communication resource that includes a forward link for transmitting signals to, and a reverse link for receiving signals from, the MS.
FIG. 1 representatively illustrates a block diagram of a wireless communication system 100 in accordance with an exemplary embodiment of the present invention. Wireless communication system 100 includes a RAN 104 comprising multiple BTSs 106-108 that are each coupled to a CBSC 110. RAN 104 is coupled to an MSC 114, and MSC 114 is in turn coupled to an external network 116 and provides a communication link between the external network, or other RANs, and RAN 104. In an embodiment, RAN 104 is a CDMA network.
Wireless communication system 100 further includes a mobile station 102, 103, 105 that may be in a dormant data session with a BTS 106, 107, 108. That is, mobile station 102 if it is in a dormant data session, for example, is not in an active communication session with BTS 106, but is powered-up, registered and may have been recently in an active communication session with BTS 106. While RAN 104 is aware of mobile station 102, no active communication is currently occurring between mobile station 102 and RAN 104. In a dormant data session, mobile station 102 is a dormant mobile station, which is registered with RAN 104 and coupled to send or receive data via wireless link 120. Each communication link 120, 130, 140 includes a respective forward link for conveyance of signals to mobile station 102 and a respective reverse link for receipt of signals from the mobile station 102. Either mobile station 102 receiving a data packet via RAN 104, or a user of mobile station 102 sending a data packet may reactivate dormant data session. Any number of mobile stations 102, 103, 105 may be coupled to RAN 104 and be in a dormant data session.
CBSC 110 may also include Packet Control Function (PCF) 118. In an embodiment, PCF 118 is coupled to communicate packet data, particularly IP packet data, between the mobile station 102, and the Packet Data Serving Node (PDSN) 139 over an interface, the A10/A11 interface in the case of a CDMA network. Packet control function 118 may operate to maintain a reachable state between RAN 104 and mobile station 102, ensuring a consistent link for data packets, buffering of data packets arriving from PDSN 139 when wireless link resources are not in place or are insufficient to support the flow from PDSN 139, and relay data packets between the mobile station 102 and PDSN 139. PCF 118 is not limited to a PCF in a CDMA network and may include one or more nodes in other radio access networks such as GSM, TDMA, and the like, that perform a substantially similar function.
PDSN 139 may be coupled to operate as the gateway from the RAN 104 into a public and/or private packet network, for example and without limitation, the Internet 113. In an embodiment, PDSN 139 may act as a network access server, home agent, foreign agent, and the like. PDSN 139 may manage the radio-packet interface between RAN 104 and Internet 113, provide IP addresses for the subscriber's mobile station 102, 103, 105, perform packet routing, actively manage subscriber services based on profile information, authenticate users, and the like.
In an embodiment, PCF 118 may be coupled to receive incoming data packets addressed to a dormant mobile station 102. In other words, PCF 118 may be coupled to receive incoming data packets addressed to reactivate a dormant data session with mobile station 102. Such incoming data packets may originate from a packet data network external to RAN 104, such as users connected to the Internet 113, and the like. As an example, incoming data packets may be incoming data coupled with a push-to-talk session, paging request, and the like. For example, mobile station 102 may be registered with RAN 104 but have no currently active data sessions in progress, i.e. mobile station 102 is in a dormant data session. The arrival of a data packet, for example as part of a paging request, may operate to reactivate dormant data session by reactivating dormant mobile station 102.
In an embodiment, PCF 118 is coupled to examine incoming data packets and determine if reactivation of a dormant data session with a dormant mobile station is permitted. In an exemplary embodiment, PCF may scan incoming data packets, including source IP addresses and destination IP addresses to determine if an incoming data packet is the product of a malicious IP scan or from a legitimate user.
In an illustrative embodiment, a plurality of packets 160 may be received by PCF 118 via PDSN 139. In an embodiment, plurality of packets 160 may include any number of data packets, for example and without limitation IP packets. Each of plurality of packets 160 may have a source IP address 142 and a destination IP address 141. The source IP address 142 is an indication of the origination of the data packet, while the destination IP address 141 may be coupled to reactivate one or more dormant mobile stations 102, 103, 105. In other words, one or more of plurality of packets 160 may be addressed to reactivate a dormant data session with one or more of dormant mobile stations 102, 103, 105. This can be, for example, a paging request, and the like.
FIG. 2 representatively illustrates a more detailed block diagram of a wireless communication system 200 in accordance with an exemplary embodiment of the present invention. Only one BTS 107 and one mobile station 103 are shown for clarity. However, other BTS's and mobile stations may be included and be within the scope of the invention.
As shown in FIG. 2, the plurality of packets 160 arriving at the RAN may be processed by the PCF 118. In an embodiment, plurality of packets 160 may include any number of data packets, for example, IP packets. In an embodiment, the PCF 118 creates a sliding window average over a time interval of plurality of packets arriving that request the reactivation of a dormant data session of a dormant mobile station 103. Based on this average, a dynamic threshold may be created such that any single time interval in which the arrival rate of packets requesting reactivation exceed the dynamic threshold, the PCF may discard a number of packets from one or more source IP addresses such that the arrival rate falls below the dynamic threshold.
In an embodiment, incoming packets may be buffered such that PCF 118 examines incoming plurality of packets over a previous time interval to determine what packets to discard during the current time interval. During normal operation of RAN 104, the reactivation rate of dormant mobile stations (number of reactivations per unit time) remains fairly constant when averaged over a short period of time. A surge in reactivation rates may be detected when the variance in reactivation rate relative to a short term average exceeds a predefined limit. At the onset and for the duration of a surge, the source address of those data packets associated with reactivation requests may be analyzed to determine the total number of reactivation requests per unit time associated with each source IP address.
In an embodiment, to determine if a surge condition exists, the arrival rate of packets requesting reactivation can be compared with a multiple of the short term average of reactivation requests from a previous time interval. For example and without limitation, if the reactivation rate over a five second time interval is ten reactivations per second, then a surge in reactivation requests may be defined as a multiple of this number, say five to six times, or fifty to sixty reactivations in a one second time interval.
If a surge condition is detected, PCF 118 may examine packets requesting reactivation and identify the source address(es) most responsible for the surge condition and discard those packets such that they are never processed and do not reactivate a dormant mobile station. For example, packets may be sorted into groups from high number of packets to low number of packets based on their source IP address. The group of packets from a single source IP address with the highest number of packets may be discarded and the algorithm re-run if necessary to discard the group of packets with the next highest number of packets based on source IP address. This may continue until enough packets are discarded to alleviate the surge condition. The packets that are not discarded may be processed as normal and reactivate a dormant mobile station.
As shown in FIG. 2, PCF 118 may receive a first plurality of packets 150 over a first time interval 151. First time interval 151 may be selected to suit a given application. For example and without limitation, first time interval 151 may be approximately five seconds. First plurality of packets 150 may be data packets that are coupled to request a reactivation of a dormant mobile station 103. Based on the number of first plurality of packets 150 requesting reactivation received in first time interval 151, an average number of reactivation requests received in a given time interval, for example one second, may be calculated. From this, activation rate threshold 149 may be calculated. In an embodiment, activation rate threshold 149 may be a multiple of the average of the arrival rate of first plurality of packets (first plurality of packets 150 received over first time interval 151). In other words, activation rate threshold 149 may be a multiple of the average number of reactivation requests received in a given time interval. The multiple number (multiplier) may be chosen such that activation rate threshold 149 represents the point at which a surge condition is imminent. In other words, the average arrival rate may be calculated over first time interval 151 and this average arrival rate in a given time period may be multiplied by a multiplier to yield activation rate threshold 149. For example, if the average arrival rate over the first time interval 151 is ten reactivation requests per second over a five second time interval (first time interval 151), then activation rate threshold may be a multiple of the ten reactivation requests per second as described above.
In an embodiment, PCF 118 may buffer and store a second plurality of packets 152 received in a second time interval 153 where each of second plurality of packets 152 has a destination IP address 141 coupled to reactivate at least one dormant mobile station 103. Second time interval 153 may be selected to suit a given application. For example and without limitation, second time interval 153 may be approximately one second. In an embodiment, second time interval 153 follows first time interval 151 as shown in FIG. 2. Also, first time interval 151 may be longer than second time interval 153 so as to maintain an adequate sample of reactivation requests for calculating activation rate threshold 149. In another embodiment not shown in FIG. 2, second time interval 153 may be a portion of first time interval 151.
In an embodiment, an arrival rate 143 of second plurality of packets 152 may be calculated. This may be the number of second plurality of packets 152 arriving in second time interval 153. The arrival rate 143 of the second plurality of packets 152 may then be compared to the activation rate threshold 149 calculated above. If the arrival rate 143 exceeds the activation rate threshold 149, then the second plurality of packets 152 may be separated into a plurality of source IP groups 145 according to their respective source IP addresses. For example, the portion of second plurality of packets 152 having the most number of packets from one source IP address may be grouped into a source IP group having the highest number 170 of second plurality of packets. The portion of second plurality of packets 152 having next highest number of packets from another source IP address may be grouped into a source IP group having a next highest number 171 of second plurality of packets, and so on for next highest numbers 172, 173. Any number of groups of second plurality of packets may be created for plurality of source IP groups 145. Further, any number of a portion of second plurality of packets may be included in each of source IP groups 145. In an embodiment, if the arrival rate 143 of second plurality of packets 152 is less than the activation rate threshold 149, then the second plurality of packets 152 may proceed to be processed by PCF and reactivate one or more dormant mobile stations 103.
In an embodiment, a selective reactivation algorithm 147 may progressively discard in descending order, one of the plurality of source IP groups 145 having a highest number of second plurality of packets until the arrival rate 143 is below the activation rate threshold 149. In an embodiment, progressively discarding in descending order may include discarding one or more source IP groups having the highest number 170 of second plurality of packets 152 all at once. In this embodiment, selective reactivation algorithm 147 may evaluate which of the plurality of source IP groups 145 should be discarded to bring the arrival rate 143 below the activation rate threshold 149 and then discard the one or more plurality of source IP groups all at once.
In another embodiment, progressively discarding in descending order may include discarding the source IP group having the highest number 170 of second plurality of packets 152 and then comparing the arrival rate 143 of the second plurality of packets 152 in the second time interval 153 without the discarded source IP group, to the activation rate threshold 149. If the arrival rate of the second plurality of packets 152 in the second time interval 153 without the discarded source IP group still exceeds the activation rate threshold 149, the source IP group having the next highest number 171 of second plurality of packets 152 may be discarded. Comparing and discarding source IP groups in descending order based on number of second plurality of packets 152 in the source IP group may iteratively continue until the arrival rate 143 falls below the activation rate threshold 149.
In an embodiment, during a third time interval 155, any of second plurality of packets 152 not discarded may be processed and allowed to reactivate one or more dormant mobile stations 103. In effect, discarding any of the second plurality of packets 152 in one or more of the source IP groups 145 has the effect of preventing the discarded packets from being processed and reactivating a dormant mobile station 103.
In an embodiment, a protected sender may be defined such that any packets from the protected sender may be allowed to pass through and be processed by the PCF 118 to allow reactivation of a dormant mobile station 103. A packet from a source IP address of a protected sender may be prevented from being separated into one of the plurality of source IP groups 145 and subsequently discarded. This allows packets from one or more protected senders to not be classified as malicious packets and activate one or more dormant mobile stations 103.
In an embodiment, first time interval 151, which is used to calculate activation rate threshold 149 is a sliding window average over a time interval of plurality of packets arriving that request the reactivation of a dormant data session of a dormant mobile station 103. In other words, first time interval is not fixed, but continues to update with the most current data. This allows for updating the average number of reactivation requests received over first time interval 151. This allows for activation rate threshold 149 to be dynamic and change with time. A dynamic activation rate threshold 149 prevents the erroneous discarding of reactivation requests that may otherwise be legitimate as the average number of reactivation requests can change over time.
FIG. 3 representatively illustrates flow diagram 300 in accordance with an exemplary embodiment of the present invention. In this embodiment, the flow is invoked for each time step. In step 302, the PCF calculates the activation rate threshold as a function of first plurality of packets received over a first time interval, where the first plurality of packets are coupled to reactivate at least one dormant mobile station.
In step 304, a second plurality of packets received over a second time interval are buffered, where each of the second plurality of packets has a destination IP address coupled to reactivate at least one dormant mobile station. In step 306, the arrival rate of the second plurality of packets in the second time interval is compared to the activation rate threshold. In step 308, it is determined if the arrival rate exceeds the activation rate threshold. If the arrival rate in step 308 does not exceed the activation rate threshold, then in step 309 all of the second plurality of packets may be processed without discard and allowed to reactivate one or more mobile devices in a dormant state. The process then adjusts to the next time step in step 320.
If the arrival rate exceeds the activation rate threshold in step 308, then in step 310 the second plurality of packets are separated into a plurality of source IP groups based on their respective source IP address. The process then begins progressively discarding in descending order one of the plurality of source IP groups having a highest number of second plurality of packets until the arrival rate is below the activation rate threshold. In step 312, the source IP group having the highest number of second plurality of packets is discarded. Subsequently, in step 314, it is determined if the arrival rate of the second plurality of packets in the second time interval without the discarded IP source group (highest, next highest, and the like) is above the activation rate threshold. If not, then the second plurality of packets that are not discarded are processed and allowed to reactivate one or more dormant mobile stations per step 318.
If the arrival rate is still greater than the activation rate threshold in step 314, then the source IP group having the next highest number of second plurality of packets is discarded per step 316. Steps 314 and 316 may iteratively repeat themselves, discarding the source IP group having the next highest number of second plurality of packets, until the arrival rate without the discarded packets falls below the activation rate threshold and the process proceeds to step 318. In step 318, the second plurality of packets that are not discarded are processed and allowed to reactivate one or more mobile stations in a dormant state. The process then ends for this invocation and enters the next time interval where the process may be repeated.
Although the embodiment depicted in FIG. 3 illustrates the recalculation of the arrival rate after discarded each IP source group, this is not limiting of the invention. Selective reactivation algorithm may evaluate which of the plurality of source IP groups should be discarded to bring the arrival rate below the activation rate threshold and then discard the one or more plurality of source IP groups all at once.
In the foregoing specification, the invention has been described with reference to specific exemplary embodiments; however, it will be appreciated that various modifications and changes may be made without departing from the scope of the present invention as set forth in the claims below. The specification and figures are to be regarded in an illustrative manner, rather than a restrictive one and all such modifications are intended to be included within the scope of the present invention. Accordingly, the scope of the invention should be determined by the claims appended hereto and their legal equivalents rather than by merely the examples described above.
For example, the steps recited in any method or process claims may be executed in any order and are not limited to the specific order presented in the claims. Additionally, the components and/or elements recited in any apparatus claims may be assembled or otherwise operationally configured in a variety of permutations to produce substantially the same result as the present invention and are accordingly not limited to the specific configuration recited in the claims.
Benefits, other advantages and solutions to problems have been described above with regard to particular embodiments; however, any benefit, advantage, solution to problem or any element that may cause any particular benefit, advantage or solution to occur or to become more pronounced are not to be construed as critical, required or essential features or components of any or all the claims.
As used herein, the terms “comprise”, “comprises”, “comprising”, “having”, “including”, “includes” or any variation thereof, are intended to reference a non-exclusive inclusion, such that a process, method, article, composition or apparatus that comprises a list of elements does not include only those elements recited, but may also include other elements not expressly listed or inherent to such process, method, article, composition or apparatus. Other combinations and/or modifications of the above-described structures, arrangements, applications, proportions, elements, materials or components used in the practice of the present invention, in addition to those not specifically recited, may be varied or otherwise particularly adapted to specific environments, manufacturing specifications, design parameters or other operating requirements without departing from the general principles of the same.

Claims (8)

1. A method of selective dormant data session reactivation in a radio access network, comprising:
calculating an activation rate threshold as a function of a first plurality of packets received over a first time interval, wherein the first plurality of packets are coupled to reactivate at least one dormant mobile station and wherein the first plurality of packets are received by a packet control function that communicates the plurality of packets between the at least one dormant mobile station and a Packet Data Serving Node;
buffering by the packet control function a second plurality of packets received in a second time interval, wherein each of the second plurality of packets has a destination IP address coupled to reactivate the at least one dormant mobile station;
comparing by the packet control function an arrival rate of the second plurality of packets in the second time interval to the activation rate threshold;
if the arrival rate exceeds the activation rate threshold, the packet control function:
separating the second plurality of packets into a plurality of source IP groups according to their respective source IP addresses;
discarding a one of the plurality of source IP groups having a highest number of the second plurality of packets;
iteratively performing the following steps until arrival rate is below the activation rate threshold:
comparing the arrival rate of the second plurality of packets in the second time interval without the one of the plurality of source IP groups, to the activation rate threshold; and
if the arrival rate of the second plurality of packets in the second time interval without the one of the plurality of source IP groups exceeds the activation rate threshold, discarding a one of the plurality of source IP groups having a next highest number of the second plurality of packets.
2. The method of claim 1, further comprising during a third time interval, the packet control function processing the second plurality of packets not discarded, wherein the third time interval follows the first and second time intervals.
3. The method of claim 1, wherein the second time interval follows the first time interval.
4. The method of claim 3, wherein the first time interval is longer than the second time interval.
5. The method of claim 1, wherein the second time interval is a portion of the first time interval.
6. The method of claim 1, wherein the activation rate threshold is a multiple of the first plurality of packets received over the first time interval.
7. The method of claim 1, wherein discarding one of the plurality of source IP groups comprises preventing the plurality of second packets in the one of the plurality of source IP groups from reactivating the dormant mobile station.
8. The method of claim 1, further comprising defining at least one protected sender, wherein any of the second plurality of packets received from the at least one protected sender are prevented from being discarded.
US11/240,180 2005-09-29 2005-09-29 Method of selective dormant data session reactivation Expired - Fee Related US7649842B2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US11/240,180 US7649842B2 (en) 2005-09-29 2005-09-29 Method of selective dormant data session reactivation
KR1020087010180A KR100966440B1 (en) 2005-09-29 2006-06-23 Method of selective dormant data session reactivation
CN2006800359111A CN101288265B (en) 2005-09-29 2006-06-23 Method of selective dormant data session reactivation
PCT/US2006/024621 WO2007040687A1 (en) 2005-09-29 2006-06-23 Method of selective dormant data session reactivation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/240,180 US7649842B2 (en) 2005-09-29 2005-09-29 Method of selective dormant data session reactivation

Publications (2)

Publication Number Publication Date
US20070070889A1 US20070070889A1 (en) 2007-03-29
US7649842B2 true US7649842B2 (en) 2010-01-19

Family

ID=37893786

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/240,180 Expired - Fee Related US7649842B2 (en) 2005-09-29 2005-09-29 Method of selective dormant data session reactivation

Country Status (4)

Country Link
US (1) US7649842B2 (en)
KR (1) KR100966440B1 (en)
CN (1) CN101288265B (en)
WO (1) WO2007040687A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100180035A1 (en) * 2007-06-29 2010-07-15 Shinya Miyakawa Session control system, session control method and session control program

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7672336B2 (en) * 2006-12-01 2010-03-02 Sonus Networks, Inc. Filtering and policing for defending against denial of service attacks on a network
US7940657B2 (en) 2006-12-01 2011-05-10 Sonus Networks, Inc. Identifying attackers on a network
US7804774B2 (en) * 2006-12-01 2010-09-28 Sonus Networks, Inc. Scalable filtering and policing mechanism for protecting user traffic in a network
US8442560B1 (en) * 2007-11-19 2013-05-14 Kenneth P. Kiraly Mode switching user device
US8325608B2 (en) * 2008-08-07 2012-12-04 Qualcomm Incorporated Efficient packet handling for timer-based discard in a wireless communication system
US8023522B2 (en) * 2009-03-30 2011-09-20 Intel Corporation Enabling long-term communication idleness for energy efficiency
CN112398527B (en) * 2020-11-03 2021-06-29 上海擎昆信息科技有限公司 Control method and system for enabling satellite system to rapidly enter sleep state

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5490252A (en) 1992-09-30 1996-02-06 Bay Networks Group, Inc. System having central processor for transmitting generic packets to another processor to be altered and transmitting altered packets back to central processor for routing
US6304552B1 (en) 1998-09-11 2001-10-16 Nortel Networks Limited Memory and apparatus for input based control of discards in a lossy packet network
US20050111367A1 (en) 2003-11-26 2005-05-26 Hung-Hsiang Jonathan Chao Distributed architecture for statistical overload control against distributed denial of service attacks
US20050186971A1 (en) 2004-02-20 2005-08-25 Telefonaktiebolaget L M Ericsson Method and apparatus for intelligent paging in a wireless communication network
US20060050668A1 (en) * 2004-09-03 2006-03-09 Harper Matthew H RF-aware packet filtering in radio access networks that employ circuit switching
US7106691B1 (en) * 2000-11-01 2006-09-12 At&T Corp. Method for tracking source and destination internet protocol data
US7154903B2 (en) * 2001-10-19 2006-12-26 Telefonaktiebolaget Lm Ericsson (Publ) System and method for management of data associated with a dormant mobile terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004023323A1 (en) * 2002-09-03 2004-03-18 Thomson Licensing S.A. Mechanism for providing quality of service in a network utilizing priority and reserved bandwidth protocols
KR20040105355A (en) * 2003-06-07 2004-12-16 주식회사 디지털파루스 Network interface card with function for protecting denial of service attack and distributed denial of service attack and method for protecting denial of service attack and distributed denial of service attack using thereof
CN100364255C (en) * 2004-03-15 2008-01-23 中国联合通信有限公司 Processing method of snchronously transmitting speech service in CDMA network pack data service

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5490252A (en) 1992-09-30 1996-02-06 Bay Networks Group, Inc. System having central processor for transmitting generic packets to another processor to be altered and transmitting altered packets back to central processor for routing
US6304552B1 (en) 1998-09-11 2001-10-16 Nortel Networks Limited Memory and apparatus for input based control of discards in a lossy packet network
US7106691B1 (en) * 2000-11-01 2006-09-12 At&T Corp. Method for tracking source and destination internet protocol data
US7154903B2 (en) * 2001-10-19 2006-12-26 Telefonaktiebolaget Lm Ericsson (Publ) System and method for management of data associated with a dormant mobile terminal
US20050111367A1 (en) 2003-11-26 2005-05-26 Hung-Hsiang Jonathan Chao Distributed architecture for statistical overload control against distributed denial of service attacks
US20050186971A1 (en) 2004-02-20 2005-08-25 Telefonaktiebolaget L M Ericsson Method and apparatus for intelligent paging in a wireless communication network
US20060050668A1 (en) * 2004-09-03 2006-03-09 Harper Matthew H RF-aware packet filtering in radio access networks that employ circuit switching

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100180035A1 (en) * 2007-06-29 2010-07-15 Shinya Miyakawa Session control system, session control method and session control program
US8291080B2 (en) * 2007-06-29 2012-10-16 Nec Corporation Session control system, session control method and session control program

Also Published As

Publication number Publication date
WO2007040687A1 (en) 2007-04-12
CN101288265B (en) 2013-04-03
KR100966440B1 (en) 2010-06-28
KR20080066731A (en) 2008-07-16
CN101288265A (en) 2008-10-15
US20070070889A1 (en) 2007-03-29

Similar Documents

Publication Publication Date Title
US7649842B2 (en) Method of selective dormant data session reactivation
JP4987974B2 (en) Maintaining the quality of service of multimedia packet data services in transport networks
US9826430B2 (en) Controlling uplink congestion in a wireless communication network
US8385242B2 (en) Optimised messaging patterns
JP4981132B2 (en) Packet loss reduction for packet data services during transport network congestion
JP4909707B2 (en) System and method for resolving contention between applications requiring a data connection between a mobile communication device and a wireless network
US20080070603A1 (en) Idle Mode Notification
US20040052212A1 (en) Packet flow control in a wireless communications network based on an indication contained in a packet
EP2409514B1 (en) Hspa relative bit-rate aimd-based qos profiling
US20070104158A1 (en) System and method for resolving contention among applications requiring data connections between a mobile communications device and a wireless network
US9246997B2 (en) Reducing load at a proxy server
EP1388266A1 (en) Method for protecting against overload in a mobile communication network
US8948106B2 (en) Controlling telecommunications channel switching
EP2730051B1 (en) Network congestion control with adaptive qos bit-rate differentiation
US7668097B2 (en) Method of dormant data session reactivation
US20070071018A1 (en) Method of filtering a plurality of data packets
WO2005006795A1 (en) Communication system, communication unit and method of power saving therein
US7437161B2 (en) Method of fast data transmission of mobile stations via the same base station
CN104115546A (en) Controlling radio connection states
US7602768B2 (en) Method of optimizing use of high-rate packet data resources
EP2749115B1 (en) Controlling transitions between radio resource control (rrc) states
TEAM Master Thesis internship report

Legal Events

Date Code Title Description
AS Assignment

Owner name: MOTOROLA, INC., ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LABOY, JOSE A.;GROSS, JOEL L.;HANSCHE, BRIAN A.;AND OTHERS;REEL/FRAME:017067/0108

Effective date: 20050921

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: MOTOROLA MOBILITY, INC, ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA, INC;REEL/FRAME:025673/0558

Effective date: 20100731

AS Assignment

Owner name: MOTOROLA MOBILITY LLC, ILLINOIS

Free format text: CHANGE OF NAME;ASSIGNOR:MOTOROLA MOBILITY, INC.;REEL/FRAME:029216/0282

Effective date: 20120622

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: GOOGLE TECHNOLOGY HOLDINGS LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA MOBILITY LLC;REEL/FRAME:034318/0001

Effective date: 20141028

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20220119